• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Yi, Li Ying, Chen Kai. Vulnerability Detection Methods Based on Natural Language Processing[J]. Journal of Computer Research and Development, 2022, 59(12): 2649-2666. DOI: 10.7544/issn1000-1239.20210627
Citation: Yang Yi, Li Ying, Chen Kai. Vulnerability Detection Methods Based on Natural Language Processing[J]. Journal of Computer Research and Development, 2022, 59(12): 2649-2666. DOI: 10.7544/issn1000-1239.20210627

Vulnerability Detection Methods Based on Natural Language Processing

Funds: This work was supported by the National Key Research and Development Program of China (2020AAA0105200), the National Natural Science Foundation of China (U1836211), the Beijing Natural Science Foundation (JQ18011), the Youth Innovation Promotion Association CAS, and the Project of Beijing Academy of Artificial Intelligence (BAAI2020ZJ0402).
More Information
  • Published Date: November 30, 2022
  • With the number of the official reported vulnerabilities is exponentially increasing, the researches aiming at the techniques of vulnerability detection is arising. The diversity of vulnerability types and the unicity of detection methods result in the limitation of the vulnerability detection achievement. The main streams of the research on vulnerability detection methods are static detection and dynamic detection. Static detection includes document analysis, cross validation, and program analysis, etc. With the natural language processing is rising and the knowledge is booming, the researchers explore the possibility of vulnerability detection on multiple data resources with the help of natural language processing technique. In this paper, the literatures are classified into four parts which are official document, code, code comment and the vulnerability-related information based on the sources of information. Firstly, we extract the technical details and classify the research achievement by conducting an investigation on the related researches of the vulnerability detection methods based on natural language processing in recent 10 years, and then we summarize the relative merits of the research achievement by comparing and analyzing the researches originated from various data sources. Finally, through conducting cross comparison and in-depth exploration researches, we conclude eight types of limitations of vulnerability detection methods based on natural language processing and then discuss the solutions on the level of data, technique and effect, and meanwhile propose the future research trends.
  • Related Articles

    [1]Zhang Yuhong, Zhi Wenwu, Li Peipei, Hu Xuegang. Semi-Supervised Method for Cross-Lingual Word Embedding Based on an Adversarial Model with Double Discriminators[J]. Journal of Computer Research and Development, 2023, 60(9): 2127-2136. DOI: 10.7544/issn1000-1239.202220036
    [2]Liu Linfeng, Yu Zixing, Zhu He. A Link Prediction Method Based on Gated Recurrent Units for Mobile Social Network[J]. Journal of Computer Research and Development, 2023, 60(3): 705-716. DOI: 10.7544/issn1000-1239.202110432
    [3]Ma Ang, Yu Yanhua, Yang Shengli, Shi Chuan, Li Jie, Cai Xiuxiu. Survey of Knowledge Graph Based on Reinforcement Learning[J]. Journal of Computer Research and Development, 2022, 59(8): 1694-1722. DOI: 10.7544/issn1000-1239.20211264
    [4]Wang Honglin, Yang Dan, Nie Tiezheng, Kou Yue. Attributed Heterogeneous Information Network Embedding with Self-Attention Mechanism for Product Recommendation[J]. Journal of Computer Research and Development, 2022, 59(7): 1509-1521. DOI: 10.7544/issn1000-1239.20210016
    [5]Yang Yanjie, Wang Li, Wang Yuhang. Rumor Detection Based on Source Information and Gating Graph Neural Network[J]. Journal of Computer Research and Development, 2021, 58(7): 1412-1424. DOI: 10.7544/issn1000-1239.2021.20200801
    [6]Zhang Shenglin, Li Dongwen, Sun Yongqian, Meng Weibin, Zhang Yuzhe, Zhang Yuzhi, Liu Ying, Pei Dan. Unified Anomaly Detection for Syntactically Diverse Logs in Cloud Datacenter[J]. Journal of Computer Research and Development, 2020, 57(4): 778-790. DOI: 10.7544/issn1000-1239.2020.20190875
    [7]Fang Yang, Zhao Xiang, Tan Zhen, Yang Shiyu, Xiao Weidong. A Revised Translation-Based Method for Knowledge Graph Representation[J]. Journal of Computer Research and Development, 2018, 55(1): 139-150. DOI: 10.7544/issn1000-1239.2018.20160723
    [8]Yang Lin, Zhang Libo, Luo Tiejian, Wan Qiyang, Wu Yanjun. Knowledge Schematization Method Based on Link and Semantic Relationship[J]. Journal of Computer Research and Development, 2017, 54(8): 1655-1664. DOI: 10.7544/issn1000-1239.2017.20170177
    [9]Liu Zhiyuan, Sun Maosong, Lin Yankai, Xie Ruobing. Knowledge Representation Learning: A Review[J]. Journal of Computer Research and Development, 2016, 53(2): 247-261. DOI: 10.7544/issn1000-1239.2016.20160020
    [10]Wang Yanshi, Wang Wei, Liu Zhaohui, Wei Jun, Huang Tao. A Mechanism for Transparent Data Caching[J]. Journal of Computer Research and Development, 2015, 52(4): 907-917. DOI: 10.7544/issn1000-1239.2015.20131910
  • Cited by

    Periodical cited type(2)

    1. 张学旺,雷响. 基于层次化群签名的联盟链身份隐私保护方案. 信息安全研究. 2024(12): 1160-1164 .
    2. 夏莹杰,朱思雨,刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究. 通信学报. 2023(04): 111-123 .

    Other cited types(6)

Catalog

    Article views (808) PDF downloads (479) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return